Microsoft today launched the new Windows Bounty Program that will allow anyone to find critical security issues in Windows and get rewarded by reporting it to Microsoft. It includes all features of the Windows Insider Preview in ...

There were two Windows operating systems largely immune to the recent Wannacry cyber attack. The first, Windows XP, was largely spared due to a bug in the Wannacry code, and the second, Windows 10, had more advanced defences than ...

The Zero Day Initiative (ZDI), founded by TippingPoint, is a program for rewarding security researchers for responsibly disclosing vulnerabilities. The latest Pwn2Own competition was held last week and Microsoft Edge browser was s...

Channel 9 today announced The Maker Show, a new show for makers, hackers, developers and disassemblers. Each week, Microsoft expert will go hands-on with techniques, how to’s, tips & tricks in various maker areas. This s...

Microsoft’s Outlook.com was recently subjected to a man-in-the-middle (MITM) attack in China. Greatfire.org reported about this attack today with the following information. We have tested Outlook to verify the attack and h...

A report today revealed that Russian hackers exploited the bug in Microsoft Windows and other software in PCs used by NATO, the European Union, Ukraine and companies in the energy and telecommunications sectors. Cyber intelligence...

As Microsoft announced last year, Microsoft started expanding encryption across their services in an effort to reinforce legal protections for their customers’ data last month. All Outlook.com emails are now encrypted like how ...

The Smoking Gun reports a group of alleged hackers have been charged with breaking into the computer systems of the U.S Army, Microsoft, and several other firms to steal pre-release copies of popular video games like “Call of D...

In a recent job posting Microsoft has made its intention to secure Windows Phone very clear. The company is looking for a software Development Engineer in Test to engage in “cutting edge fuzzing technology, pentesting, and o...